whitepaper Marketing CAN-SPAM Compliance Overview

Size: px
Start display at page:

Download "whitepaper Email Marketing CAN-SPAM Compliance Overview www.exacttarget.com"

Transcription

1 Design Marketing Tips for Outlook CAN-SPAM 2007Compliance whitepaper Marketing CAN-SPAM Compliance Overview The CAN-SPAM Act (the Act ) passed with a nearly unanimous vote in both the House and Senate and was signed into law by President Bush in December of The Federal Trade Commission (FTC) along with numerous Internet Service Providers (ISPs) has since used the law to take action against bad actors in the space. This whitepaper explores the practical and legal aspects of the CAN-SPAM Act and provides advice about minimizing the risks of marketing. remains one of the most effective vehicles for marketing, communication, and customer retention, and organizations that enact sending best practices will reap the long-term rewards of positive sending reputations, higher customer loyalty, and spotless ISP relationships. Marketers Beware The Act is designed to target the most egregious spammers and their fraudulent and deceptive practices not to hinder the sending practices of legitimate businesses. However, the CAN-SPAM Act can cause some potential pitfalls for unwary marketers. Those that fail to implement sending best practices and abide by the rules outlined in the CAN-SPAM Act could face fines, costly lawsuits, or worse yet prison. Yet, implementing change across enterprises can be challenging, especially for marketers who don t realize their organizations are at risk. It is, therefore, vital that all marketers sending outbound marketing messages whether promotional, educational, or otherwise familiarize themselves with the CAN-SPAM Act and make sure their marketing programs are compliant. Raising the Bar FTC Passes New CAN-SPAM Rules This whitepaper gives marketers guidance regarding the FTC s CAN- SPAM Act, including its new rules effective July 7, 2008 regarding: 1. Liability Clarifications (see page 3) 2. Post Office Box Address Notations (see page 5) 3. Unsubscribe Requirements (see page 6) 4. Definition of Sender (see page 11) The scrutiny of marketing affects not only legislation and litigation, but also the processing industry. With encouragement from anti-spam action groups, most ISPs and anti-spam filtering technologies have set the bar much higher for marketers than even state and federal laws legally require. Aimed at reducing the amount of SPAM consumers receive, senders suffering from high rates of undeliverable s or SPAM complaints are often filtered by ISPs. This whitepaper is divided into three sections that will help your organization stay CAN-SPAM compliant: Part One: Exploring the CAN-SPAM Act (Page 2) Part Two: Common CAN-SPAM Pitfalls And How to Avoid Them (Page 8) Part Three: Raising the Bar Permission and Deliverability (Page 13) How Good is Your Reputation? Download The Reputation Equation: Marketing & ISP Relationships from to get best practices and tips for improving your ISP sending reputation ExactTarget. All rights reserved.

2 Part One: Exploring the CAN-SPAM Act This section summarizes the major provisions of the CAN-SPAM Act, including: CAN-SPAM Act Overview What is Criminal Civil Actions and Penalties Required Commercial Content CAN-SPAM Act Overview The U.S. Senate Commerce Committee defined the CAN-SPAM Act as follows: The purposes of this legislation are to: (i) prohibit senders of electronic mail ( ) for primarily commercial advertisement or promotional purposes from deceiving intended recipients or ISPs as to the source or subject matter of their messages; (ii) require such senders to give recipients an opportunity to decline to receive future commercial from them and to honor such requests; (iii) require senders of unsolicited commercial (UCE) to also include a valid physical address in the message and a clear notice that the message is an advertisement or solicitation; and (iv) prohibit businesses from knowingly promoting, or permitting the promotion of, their trade or business through transmitted with false or misleading sender or routing information. Commercial or Transactional? Wondering which of your s are covered by the Act? Request a copy of the Transactional v. Commercial Data Sheet from an ExactTarget representative. The Act prohibits predatory and abusive commercial practices, and restricts the transmission of certain s that do not include proper disclosures regarding their nature and origin. Specifically, the law clearly prohibits commercial transmissions after a recipient has opted-out of receiving such communications from the sender. With the Act in place, legitimate senders can now focus on complying with a single law, instead of juggling differing state regulations. The law also prevents nuisance lawsuits that in the past could have been brought by individuals under these varying state laws, including private rights of action. Commercial v. Transactional Only commercial is regulated by the CAN-SPAM Act the law does not regulate transactional or relationship messages (primary purpose is non-commercial). Transactional messages might include communications like purchase and shopping confirmations (even if the messages relate to a consumer s commercial transaction), health or safety updates, recall notices, or employment communications. Transactional Marketing Want to learn more about transactional ? Download the Transactional Marketing Whitepaper from 2

3 What is Criminal? The Act prohibits certain predatory and abusive commercial electronic mail. Section 4 of the Act generally addresses the manipulation of subject lines, headers, and origination information used to evade detection by ISPs and filters. The section then provides specific penalties for initiators of such acts (and conspirators) including imprisonment, fines, and forfeiture of property used or gained in commission of the offense. In May 2008, the FTC added a definition of the term person in order to clarify that the law s obligations are not limited to natural persons. This essentially means that the scope of the Act includes individuals, groups, unincorporated associations, corporations, and nonprofits. All of these groups must comply with the CAN-SPAM Act. Prohibited Under Section 4 of the CAN-SPAM Act: Hiding Origin By Using Other Computers (Hacking and Relaying) Accessing a computer without authorization to initiate the transmission of multiple s is prohibited. Similarly, using a computer to relay or retransmit multiple messages with the intent to hide the origin of the message is prohibited. Spammers sometimes use different computers with or without permission to hide the true origin of an (thus, evading filters and other blocking techniques used by ISPs). Beg, Borrow, and Steal Some spammers try to hide the origin of their s by using other computers to transmit messages. Such actions are prohibited by the CAN-SPAM Act. False or Misleading Header Information Spammers often try to disguise their sending identity by falsifying header information, typically the only portion of the message seen by the receiving mail server. Spammers constantly change and falsify header information in an effort to avoid detection, confuse SPAM filters, and allow them to continue sending SPAM. The CAN- SPAM Act prohibits the initiation of multiple s with materially falsified header information. Deception in Registration, Domain Names, and Ownership of IP Addresses The Act prohibits initiating multiple s from an account where the initiator has registered five or more accounts or two or more domain names using information that materially falsifies the registrant s true identity. The Act further prohibits initiating multiple s from an IP address when the initiator has falsely represented he or she is the registrant of the address. Violations of the above provisions may result in fines or up to five years imprisonment, depending on the seriousness of the violation and other factors. Section 4 of the Act provides for forfeiture of property used in connection with the commission of the offense, gained in, or traceable to the commission of the offense. The Act directs the U.S. Sentencing Commission to amend sentencing guidelines to provide specific, appropriate criminal penalties. 3

4 Civil Actions and Penalties Section 5 of the Act provides additional protections in the form of civil actions. However, the law does not provide a civil cause of action for individuals against violators of the CAN-SPAM Act. Instead, the Act empowers the Attorneys General of each state to pursue violators of certain parts of Section 5 on behalf of the residents of their states. Additionally, the following guidelines apply to civil actions and penalties: An Attorney General can also pursue money damages, injunctive relief to stop further violations of the Act, or statutory damages up to $2,000,000. Just the Facts Ma am The CAN-SPAM Act does not permit suits to be brought by individuals. Only certain federal agencies, state attorneys general, and ISPs can enforce the provisions of the Act. Penalty values may be increased for the inclusion of false or misleading information or if circumstances support a finding of aggravated damages. Statutory damages can reach up to $250 per address to which an is sent. A court may increase awarded damages if it finds aggravating circumstances. At its discretion, it may also award attorney fees for successful actions. Certain federal agencies may file a civil action under the law, and ISPs are provided a civil cause of action against violators of certain sections of the Act. Finally, the Act generally can be enforced by a variety of federal agencies noted in the Act when the actions (or actors) fall within the agency s jurisdiction. 4

5 Required Commercial Content According to the Act, commercial marketers must include several types of information before sending messages to any recipient. Marketers should work with their legal counsel to make sure communications are compliant in each content area. The CAN-SPAM Act requires the following: All Commercial Must Contain a Valid Opt-Out Mechanism Every commercial message must contain a valid mechanism allowing the recipient to unsubscribe (preventing them from receiving any further s from the associated sender). Opt-out information must be provided clearly and conspicuously in each message. Companies can provide a generic opt-out from all communications or a more specific menu of options to permit recipients to opt-out of certain types of commercial s as long as recipients are also given the option to opt-out of all communications. Easy Opt-Out Every commercial must include a clear and ideally instantaneous opt-out mechanism. Opt-Out Requests Must Be Honored Within 10 Business Days The original law allowed the FTC to later set a different number of days requirement. However, in May 2008, the FTC reaffirmed its 10 business day requirement. Most list management tools and Service Providers (ESPs) effectively handle unsubscribe or opt-out requests immediately a best practice all marketers should embrace. However, the ten day window allows for appropriate management of opt-outs in various scenarios, including data synchronization across multiple systems that may only be configured periodically. Sender Must Include a Valid Physical Postal Address Senders must include their physical postal address in the body of every message. In May 2008, the FTC clarified that a post office box or similar postal address will satisfy the requirements of the Act. What About Post Office Boxes? As of May 2008, Post Office Boxes (and similar addresses) are acceptable forms of physical address in an message. 5

6 Opt-Out Process Must Be Uncomplicated In May 2008, the FTC issued updated rules that clarified the opt-out process as required by the Act. The rules indicated the consumer opt-out process may not be conditioned on the payment of any fee. In addition, the opt-out mechanism must only rely on the consumer s input of an address. The opt-out process cannot require a password (or any other information) which may act as a barrier to the consumer s ability to unsubscribe. The opt-out mechanism must rely on either a reply-to mailbox ( -based process) or a visit to a single webpage (web-based process). Assuming a web-based process, any opt-out link in a commercial message must link directly to a page where the recipient can immediately opt-out of further messages. The FTC indicated that multiple steps to verify the identity of the recipient, log-ins, or other account confirmations are unnecessarily burdensome and no longer allowed. Subscription and Profile Centers Subscription Centers should include clear opt-out links (without requesting any more subscriber information than an address). ExactTarget automatically adds an Unsubscribe From All link to your Profile Center to follow this best practice. 6

7 If Unsolicited, An Must Provide a Clear Notice That It Is An Advertisement The law does not make a recommendation for the specific language to be used to fulfill this requirement, or how it is to be positioned in the . Note: this does not make unsolicited commercial s acceptable to ISPs; they can and do set higher permission-based standards for marketers. Operative Opt-Out Mechanism Requirement A valid return address (or comparable Internet-based communication technology) must allow a recipient to opt-out of future communications, and the operative opt-out mechanism must be available for at least 30 days following a mailing. The Act provides leniency for temporary outages. Senders Must Label Sexually-Oriented Messages For s containing adult or sexual content, senders are required to include the warning, SEXUALLY-EXPLICIT: in the subject line. The Act outlines additional requirements and penalties for messages involving sexually-oriented material. No False, Deceptive, or Misleading Transmission Information or Subjects This requirement focuses on deceptive practices often used by spammers to avoid filters and encourage recipients to open a message and respond to a false offer or scam. Note: The Act specifies that s containing accurate identification of the message s initiator are not classified as false or misleading. Mistaken Identity Sample phishing illustrates sender posing as a recognized brand in order to trick recipients into sharing personal information. 7

8 Part Two: Common CAN-SPAM Pitfalls And How to Avoid Them At first glance, the CAN-SPAM Act establishes fairly basic rules for an organization to follow. However, given that this law is constantly evolving (as seen when the FTC enacted four new rules in May 2008), new details and judicial interpretations will surely follow. marketers must remain alert to changes and proactively avoid the common pitfalls outlined below. 1. Develop and Enforce an Enterprise-Wide Unsubscribe or Opt-Out Process The Act s opt-out requirement states: Require such senders to give recipients an opportunity to decline to receive future commercial from them and to honor such requests. To ensure your organization is compliant, ask yourself these important questions: Is your company technically prepared to manage and maintain not just one but potentially several suppression lists of recipients who don t want to receive commercial ? Do you have a method to control opt-out requests and suppression lists across all departments within the enterprise? Do you have the technological capability and capacity to log and maintain a master suppression list and several more specific suppression lists simultaneously? Do you have the decision-making and communication procedures in place to determine when a subscriber has opted-out of all (versus only some) future communications, and to inform your database administrator of subscriber changes? Can your company make appropriate permission changes within ten business days of that opt-out request as required by the Act? Get Organized Every ExactTarget automatically provides a link to a Profile Center, which gives subscribers the option to opt-out of specific communications or all communications. What does that mean for the marketer? Organized suppression lists and peace of mind. Can database updates be communicated to all locations of your company s enterprise that use this data quickly enough to prevent another area of the company from contacting an unsubscribed user after 10 days have passed? Addressing these questions can be challenging, especially for organizations with disparate data sources, decentralized marketing programs, several physical locations, or multiple divisions or processes. But the stakes for ignoring the Act s requirements are high, and a failure to properly handle opt-out requests can lead to prosecution and severe penalties. Organizations must make a concerted effort to not only implement the proper technology to handle opt-out processes, but also to ensure the philosophy of honoring that opt-out is adopted at every single customer touch point from the CEO to a local sales representative. If systems cannot support centralized unsubscribe list management efforts, organizations should consider offering employee education and training about the risks associated with commercial marketing and the CAN-SPAM Act. 8

9 One option for managing unsubscribes in a central location is engaging a single provider. ESPs like ExactTarget have the ability to manage unsubscribe data in a centralized and secure location, instead of managing data across multiple divisions of the organization. In addition to the fact that ESPs have experience managing and the complexities of list removal, data centralization provides an easy way for marketers to streamline multiple communications and clean subscriber data. It also provides enterprise-level security that assets are stored in a secure, encrypted environment. 2. Enforce CAN-SPAM Compliance with Every and Every Employee The Delivery Guru Look for more insights about the world of CAN-SPAM compliance and marketing deliverability from ExactTarget s Director of Privacy & Deliverability. Check out Al Iverson s blog, The Delivery Guru, at Individual employee s present a substantial risk to companies lacking a central control point over their communications. As the Act provides, organizations and their agents (employees, contractors, etc.) must honor the recipient s request to stop further mailings. Legal ramifications can result from as few as one employee s poor decision to send an to a recipient who has opted-out. It Only Takes One Be sure every employee understands proper permission procedure, and that every commercial is compliant with CAN-SPAM. One mismanaged commercial is enough to cause serious trouble with the FTC. 9

10 3. Develop a Strategy for Capturing Affirmative Consent CAN-SPAM provides advantages to organizations that only send to recipients who have opted-in to their communications. Per the Act, affirmative consent (also referred to as permission marketing, explicit opt-in, or direct consent) exists if a recipient has expressly consented to receive the message, either in response to a clear and conspicuous request for such consent or at the recipient s own initiative. When affirmative consent is obtained, commercial labeling requirements no longer apply. For example, a company that promotes products through an promotion to consumers who have willingly provided their addresses to receive such promotions does not need to include an advertisement label on their s. This is advantageous as such advertising labels which can be easy targets for SPAM filters. 4. Don t Send Unsolicited Messages The law states that in the case of unsolicited commercial messaging, all messages must be clearly identified as an advertisement or solicitation (though the Act does not specify the exact labeling method required). marketers need to be aware that ISPs commonly block messages with such labels. So senders who have to label a message as a solicitation or advertisement will nearly guarantee that it will be widely filtered or blocked by ISPs. While the law effectively allows the sending of unsolicited commercial if all applicable requirements are followed, it does not prohibit ISPs and SPAM filtering service providers from discarding or refusing to deliver unsolicited mail. The vast majority of ISPs and ESPs have policies prohibiting the sending of unsolicited commercial messages from their networks (or to their users) and are quick to block messages they deem unsolicited commercial . As a best practice, companies should never send unsolicited messages. Walks Like SPAM, Talks Like SPAM The law allows the sending of unsolicited commercial if applicable requirements are followed, but ISPs and SPAM filtering service providers are still allowed to discard or refuse to deliver unsolicited . 10

11 The law might also cause an organization to ask what should happen when a consumer visits its website and provides an address as part of a request for information. Does the Act require them to send in response to the inquiry which includes an optout, valid physical address, and reply address? The Act defines a commercial electronic mail message as any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service. Therefore, if an is a first communication with a recipient and is truly in response to the consumer s inquiry, arguably the primary purpose is not to advertise or promote. Rather, its purpose is to respond to an inquiry from the consumer. However, subsequent communications or promotions for products and services should include an opt-out, valid physical address, and reply address per the Act. Creating a method to capture affirmative consent such as an opt-in checkbox on a web form provides clarity about whether future subscriber s are warranted. Though a physical postal address and unsubscribe mechanism are required, a company might be able to avoid the commercial labeling requirement if it secures affirmative consent. For more information on affirmative consent and permission marketing, see Part Three of this whitepaper. 5. Be Careful When Relates to a Particular Business Segment The Act provides, if an entity operates through separate lines of business or divisions and holds itself out to the recipient throughout the message as that particular line of business or division rather than as the entity of which such line of business or division is a part, then the line of business or the division shall be treated as the sender of such message for purposes of this Act. Under the law, a sender is defined as the entity whose goods or services are advertised in a commercial message. Updated rules provide a clearer definition of sender, and make it easier to determine which of multiple parties advertising in a single message is responsible for complying with the Act s opt-out requirements. The sole sender appearing in the from line of the becomes the designated sender of the message and must comply with all provisions of the Act (such as listing a physical postal address and providing an opt-out mechanism). When In Doubt, Opt Them Out If subscribers might assume their optout applies to more than one business unit, remove them from all related lists just to be on the safe side. In other words, if a particular business division sends an which indicates it is an advertisement from that division, the parent organization can continue to send s to recipients that have opted-out to communications from the division. Organizations should implement procedures and educate their divisions, business units, and other affiliates to clearly indicate the sender on every message and specifically to identify the business division from which the subscriber can opt-out. If a commercial transmission could be mistakenly understood as originating from the parent organization, it is even more important to clearly identify the particular line of business or division as the sender. The most conservative approach is to eliminate the recipient from all of the lists of the related companies. 11

12 6. Avoid Misleading Subject Lines In the past, marketers could achieve significantly higher response rates by using promotional language and teasers in a subject line that enticed recipients to open the . For example, a legitimate anti-virus software company might use the subject line: Your computer may be infected to encourage recipients to open its message. But today, the same subject lines are easy targets for SPAM filters and may actually violate the Act. Times are Changing And your subject lines must change with them. The teaser phrases that were successful in the past often throw red flags for today s SPAM filters. Companies need to educate employees and develop internal communication processes to ensure that its marketers are aware of similar constraints on their creative licenses. Specifically, companies should develop a review process to ensure subject line restrictions are upheld. And when in doubt, marketers should consider the standpoint of the reasonable recipient to determine if a subject line is misleading or could be misinterpreted. 7. Obtain Opt-In for Wireless Communications The CAN-SPAM Act requires that companies obtain opt-in for commercial messages sent to wireless devices or cell phones. Under FCC , any commercial sent to a wireless device domains must obtain express prior authorization and an e-signature for all wireless domain subscribers. While some domains in this category are excluded, a full list of affected domains can be found here: The net effect of these restrictions and requirements is such that sending commercial messages to addresses at mobile service domains is not allowed. ExactTarget keeps a synchronized copy of all of the mobile service domains identified by the FCC (based on information provided by those service providers) and prohibits users from importing addresses that are prohibited and would violate the CAN-SPAM Act. 8. Refrain from Harvesting Addresses & Dictionary Attacks Harvesting typically refers to the automated harvesting of addresses from websites. Spammers often employ this tactic using software developed specifically for the purpose of harvesting addresses. Dictionary Attacks refer to spammers tactic of guessing addresses using an algorithm or dictionary-type tool to search for addresses. Dictionary Attacks can produce strings like ajohnson@hotmail.com, bjohnson@hotmail.com, cjohnson@hotmail.com, etc. Marketing for the Third Screen For more trends and tips regarding mobile marketing, download the Marketing for the Third Screen Whitepaper from The CAN-SPAM Act generally provides for damages of $250 per violation up to $2 million dollars (or more for violations involving a false or misleading transmission of information), but these damages may be increased for willful violations or violations where Harvesting or Dictionary Attack tactics are used. For civil action suits initiated by ISPs, damage caps for these violations are somewhat reduced. 12

13 Part 3: Raising the Bar Permission and Deliverability Some CAN-SPAM Act opponents do not believe that the Act effectively reduces SPAM. They argue that by allowing unsolicited commercial as long as an opt-out and physical addresses are present, the government is essentially legalizing SPAM. However, the anti-spam community and ISPs have long opposed any marketing situation where affirmative consent does not exist. ISPs filter billions of SPAM messages daily, and SPAM prevention is seen as a worthy cause for millions of subscribers whose inboxes are frequently flooded with fraudulent s, bogus health claims, and pornography. CAN-SPAM is somewhat sympathetic to the plight of ISPs and states that it shall have no effect on policies of Internet access service. The Act, therefore, does not preempt the more stringent SPAM requirements of ISPs (unlike the laws of certain states which are preempted by the law). To improve deliverability with ISPs, filtering companies, and anti-spam blacklist organizations, senders should consider the following recommendations. Deliverability Report Card ExactTarget s Deliverability Report Cards help marketers keep track of their standing with major ISPs, SPAMCop complaints, and other essential delivery metrics. 1. Play by the Rules of ISPs and Filtering Companies Inboxes are more crowded than ever, and many ISPs are diligent about blocking all messages they believe may be SPAM. However, an unfortunate portion of these blocked s originate from legitimate companies that are simply unaware of underlying ISP SPAM filtering logic. As a result, legitimate s are often filtered (a scenario known as false positive filtering ) before ever reaching their intended recipients. ISPs often combine content filtering mechanisms which scan subject lines and body content to determine which s are SPAM with other types of filters that check for number of complaints received for a specific sender. They may also look at the number of undeliverable s generated by a specific mailing when deciding whether to filter a message. Senders who deploy high quantities of promotions, send to dirty lists, or generate many complaints (who look like spammers to ISPs) are blocked. Though ISP filters are built on averages (and are therefore imperfect), they are a reality of sending commercial in today s SPAM-sensitive environment. False positive filtering sometimes occurs for s from legitimate marketers due to the commercial content of the messages. However, false positives are most prevalent with that is unwanted by recipients. Organizations should not underestimate the power of ISPs and other organizations using SPAM filtering their control over the delivery of messages only continues to increase. Are You Getting Through? Monitor your delivery success with major ISPs with edelivery Tracker, one of several advanced deliverability tools available with ExactTarget s Inbox Detective. 13

14 2. Reduce SPAM Blocking with Permission-Based Marketing Permission-based marketing is extremely important to the success of any company s marketing efforts, and provides significant deliverability and economic benefits. Also known as opt-in marketing, permission-based marketing describes sending to only those recipients who have asked to receive information from a specific company via . Organizations should strive to use standards set forth by emarketing pioneer Seth Godin, author of Permission Marketing, who proposes all marketing messages must be anticipated, personal, and relevant. By opting-in to communications, a subscriber has given permission to receive a type of message and it is the sender s responsibility to deliver (not abuse) that relationship. Building a Permission-Based Opt-In List Developing a permission-based list takes time, but the benefits far outweigh the effort. An organization focused on list growth can effectively build its permissionbased lists by capturing opt-ins at each customer/prospect touch point like at point-of-sale, on a sign-up form, kiosk, website, or during a phone call. As long as the subscriber willingly requests information via , his or her opt-in can be considered permission-based. Giving subscribers the power to choose their communication types, channels, and frequencies, helps companies build higher quality permission lists. Subscribers who specifically request information via are less likely to file SPAM complaints, and their messages are less likely to be filtered to the junk folder or discarded. Mailing to addresses gathered without subscriber knowledge or approval violates the Act. Such activities will generate more SPAM complaints that damage the sender s reputation with ISPs and jeopardizes future deliverability success. Permission-Based Marketing Want to learn how to execute an effective permission-based marketing program? Download ExactTarget s Permission-Based Marketing Whitepaper at Enterprises must also be wary of the ways in which their employees gather addresses. As opposed to Harvesting and Dictionary Attacks, there are several ways in which an employee might unwittingly gather addresses in an unsolicited fashion. For example, imagine Joe is an employee of XYZ Company. While attending a networking function, he collects business cards from several prospective clients. Although Joe has not asked each of these prospects permission to send them communications, he returns to work the following day and adds them to his company s master subscriber list. Mailing to these individuals violates the CAN-SPAM Act, and could lead to ISPs blocks, SPAM complaints, blacklists, or civil actions against XYZ Company. The best practices in this situation would have been for Joe to instead follow up with the prospective clients with a phone call. During the call, he could gain each person s consent and add his/her name to XYZ s mailing list. Alternatively, he could focus on capturing written consent at the networking function before adding the addresses to the list. Or, Joe could send a personal to each prospective client to express his pleasure in meeting the prospect and to request permission to send information in a future communication. List Growth the Right Way Learn how to build a permission audience-based list the right way by downloading the Hershey Entertainment & Resorts Case Study at 14

15 3. Move to Double Opt-in to Reduce Threat of Blacklisting Third-party anti-spam blacklists (also called block lists ) are SPAM-filtering plugins (often free) that the majority of server administrators can subscribe to. Senders who violate perceived best practice guidelines often find their sending IP addresses listed on one or more of these blacklists. servers that subscribe to the blacklist are then likely to reject all sent from blacklisted sender IP addresses. This can have a substantial impact on deliverability as a substantial percentage of an organization s is filtered before reaching the inbox. Spread the Word One blocked from one employee s address can put the entire enterprise at risk for filtering and blocks. Organizations that find their IP addresses on a blacklist are often required to prove they use permission-marketing practices before they will be removed from the blacklist. Blacklist removal requirements can vary greatly, and some blacklists may require that an ISP or ESP terminate services to the organization that caused the blacklisting before the IP address will be removed. To avoid blacklisting, organizations should always follow opt-in best practices. Permission may be qualified into two categories: single and double opt-in. Single opt-in is simply capturing approval from a subscriber to send them . Double opt-in (also called confirmed opt-in) utilizes address verification to ensure permission and log opt-in consent from the end recipient. In a double opt-in scenario, a welcome message (called an opt-in confirmation ) is sent to the subscriber. The recipient is considered opt-in only if he or she clicks on the link contained in the opt-in confirmation message. If the end recipient does not click, he or she should not to be considered opt-in or not receive any further messages. Your organization may want to consider using double opt-in to: Keep Your Lists Clean By requiring a second opt-in confirmation, organizations reduce the risk of adding misspelled or fraudulent addresses to their list. Mailing to bogus addresses raises the number of undeliverable s and increases the likelihood of filtering. It can also result in mailing to SPAMtrap addresses put in place by ISPs and filtering companies to trap unwary companies. Be Above Reproach Double opt-in addresses provide assurance as well as an electronic record that affirmative consent is in place should the company need to validate sending practices or defend against potential litigation. Perfect Your Opt-In Process Request a copy of the Opt-In Best Practices Data Sheet from an ExactTarget representative, and make sure your processes are above reproach. Guard Against SPAM Complaints Double opt-in subscribers are much less likely to complain or misidentify an as SPAM. Maintaining a low complaint rate is key to preventing ISP blocking and filtering. 15

16 4. Maximize Delivery with Opt-in Reminders Since subscriber complaints are a large component of the logic used by many filtering mechanisms, subscriber recognition of an organization and a recollection of their opt-in determines the likelihood that a recipient will file a SPAM complaint. Subscribers receiving that is expected, branded, and easy to recognize are unlikely to mistake a message as SPAM which in turn reduces the potential for filtering. For example, the best practice to improve recognition at the time of website name capture is be for an organization to list the type of which will be sent, the name of the publication, its frequency, and who it will be from. This sets expectations with subscribers and reduces the chance of complaints and filtering. Another step many organizations are taking to improve recognition and add credibility to their mailings is adding a short text reminder at the top of each . For example: You are receiving this mailing because you opted-in to receiving s from xyzco.com. Please add abc@xyzco.com as a Safe Sender in your address book. Providing text that asks each subscriber to add the sender to his or her address book will help organizations make it to the inbox, rather than having their messages routed to the bulk or junk folders. Major ISPs such as AOL, Yahoo!, MSN /Hotmail, and Microsoft Outlook route sent from senders on their users safe sender lists past SPAM filters. 5. Maintain a Consistent From Address and Subject Line Recognition It is important for organizations to maintain a consistent from name in their s for a number of reasons. First, it is an important element of recognition, and studies prove that a majority of users first look at the from name when determining whether or not they open a message. Organizations that use a consistent from name also benefit because their subscribers grow accustomed to receiving s from a particular address and begin to anticipate these messages. Second, maintaining a consistent from name will help organizations leverage the benefits of being in their subscribers safe sender address books. Another step organizations can take to ensure their subscribers recognize their s is to include the name of their organization in the subject line. The CAN-SPAM Act requires the subject line of a commercial not be misleading or fraudulent. But going a step farther by adding the company name to the subject line not only adds credibility, but also increases recognition and reduces the potential for subscriber complaints and subsequent filtering. Consult Your Legal Counsel These materials do not constitute specific legal advice and may not address all aspects of a legal development relevant to your circumstances. Consult legal counsel to determine how laws apply to your specific situations. Further, these materials are not intended to create, and receipt of them does not constitute, a lawyer-client relationship. Copyright ExactTarget and Ice Miller 2008 Summary With the passage of the Federal CAN-SPAM Act, marketers need to be aware of both the practical and legal aspects of sending commercial . The requirements of the Act will have significant impact on unwary organizations or those that fail to adjust internal procedures appropriately. However, organizations that take the proper steps to overcome challenges and risks will reap the rewards of subscriber loyalty in the long run. 16

Enterprise Email: Managing Risks and Liabilities Avoiding Common Pitfalls under the Federal CAN-SPAM Act

Enterprise Email: Managing Risks and Liabilities Avoiding Common Pitfalls under the Federal CAN-SPAM Act Enterprise Email: Managing Risks and Liabilities Avoiding Common Pitfalls under the Federal CAN-SPAM Act These materials do not constitute specific legal advice and may not address all aspects of a legal

More information

E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP

E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP E-mail Marketing: CAN- SPAM Act Compliance David J. Ervin and Christopher M. Loeffler, Kelley Drye and Warren LLP This Practice Note is published by Practical Law Company on its PLC Law Department web

More information

The DMA s Analysis of Can Spam Act of 2003

The DMA s Analysis of Can Spam Act of 2003 The DMA s Analysis of Can Spam Act of 2003 December 11, 2003 The following is a Direct Marketing Association analysis of the Can Spam Act of 2003 (S. 877), which Congress sent to the President for signing

More information

Congress Passes New Anti-Spam Legislation

Congress Passes New Anti-Spam Legislation DECEMBER 2003 Congress Passes New Anti-Spam Legislation On December 16, 2003, President Bush signed into law the Controlling the Assault of Non-Solicited Pornography and Marketing Act (the CAN-SPAM Act

More information

Privacy, Data Collection and Information Management Practice Team November 13, 2003

Privacy, Data Collection and Information Management Practice Team November 13, 2003 Overview of Current Anti-Spam Regulations Privacy, Data Collection and Information Management Practice Team The proliferation of unsolicited commercial e-mail, more commonly known as spam, has prompted

More information

Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate

Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Best Practices: How To Improve Your Survey Email Invitations and Deliverability Rate Below, you will find some helpful tips on improving your email invitations and the deliverability rate from a blog post

More information

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003

SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 SUMMARY OF PUBLIC LAW 108-187 THE CAN-SPAM ACT OF 2003 On December 16, 2003, President Bush signed into law the CAN-SPAM Act of 2003. CAN-SPAM stands for "Controlling the Assault of Non-Solicited Pornography

More information

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence!

Being labeled as a spammer will drive your customers way, ruin your business, and can even get you a big fine or a jail sentence! Getting Your Email Delivered Beware: If you send out spam mail (unsolicited emails), whether it be knowingly or not, you will put your business and your reputation at risk. Consequences for spamming have

More information

Top 40 Email Marketing Terms You Should Know

Top 40 Email Marketing Terms You Should Know 1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion

More information

Deliverability Counts

Deliverability Counts Deliverability Counts 10 Factors That Impact Email Deliverability Deliverability Counts 2015 Harland Clarke Digital www.hcdigital.com 1 20% of legitimate commercial email is not being delivered to inboxes.

More information

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing

SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render

More information

How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers

How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers How to Keep Marketing Email Out of the Spam Folder A guide for marketing managers and developers Sarah Longfors Web Developer marketing + technology 701.235.5525 888.9.sundog fax: 701.235.8941 2000 44th

More information

E-mail Marketing: CAN- SPAM Act Compliance

E-mail Marketing: CAN- SPAM Act Compliance PRACTICE NOTES E-mail Marketing: CAN- SPAM Act Compliance The following is an excerpt from a Practice Note on our website that examines the federal Controlling the Assault of Non-Solicited Pornography

More information

Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup

Email and Text Message Campaigns. Justine Young Gottshall Partner, InfoLawGroup 2012 Email and Text Message Campaigns Justine Young Gottshall Partner, InfoLawGroup What s the Risk? Effective and active marketing area This makes it a target for litigation and enforcement action Consumer

More information

Broadband Acceptable Use Policy

Broadband Acceptable Use Policy Broadband Acceptable Use Policy Contents General... 3 Your Responsibilities... 3 Use of Email with particular regards to SPAM... 4 Bulk Email... 5 Denial of Service... 5 Administration of Policy... 6 2

More information

FOR MARKETERS AND LIST OWNERS

FOR MARKETERS AND LIST OWNERS COUNCIL FOR RESPONSIBLE E-MAIL E-MAIL DELIVERY BEST PRACTICES FOR MARKETERS AND LIST OWNERS The following recommendations were developed to promote best practices for marketers and list owners seeking

More information

Enterprise Email Marketing: The 8 Essential Success Factors

Enterprise Email Marketing: The 8 Essential Success Factors Enterprise Email Marketing: The 8 Essential Success Factors How to Create High-Impact Email Marketing Campaigns When Managing Over 1 Million Sends per Month By John H. Sellers Certified Email Marketing

More information

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know

Software Solutions Digital Marketing Business Services. Email Marketing. What you need to know Software Solutions Digital Marketing Business Services Email Marketing What you need to know Contents Building Your Email List 1 Managing Your Email List. 2 Designing Your Emails 3 Branding Your Emails.....

More information

Anti-SPAM Policy v.3 06-01-2011

Anti-SPAM Policy v.3 06-01-2011 Anti-SPAM Policy v.3 06-01-2011 Each user must agree to this policy. comf5 has a no tolerance policy for the sending of spam and unsolicited email, and we prohibit the use of third-party, purchased, rented,

More information

Anchor s Email Marketing Glossary and Common Terms

Anchor s Email Marketing Glossary and Common Terms Anchor s Email Marketing Glossary and Common Terms A/B Split Test: A method used for testing the response of sending two different email campaigns to two equal segments of an email list. Marketers can

More information

Smart E-Marketer s Guide

Smart E-Marketer s Guide 30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step

More information

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered... 1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5

More information

ESPC Best Practices Guide

ESPC Best Practices Guide A division of the Network Advertising Initiative ESPC Best Practices Guide I. Introduction Email is an excellent channel for mailers to establish and maintain valuable relationships with their subscribers.

More information

Privacy Bulletin. Key Differences between US and Canadian Anti-Spam Laws

Privacy Bulletin. Key Differences between US and Canadian Anti-Spam Laws Privacy Bulletin April 2014 Key Differences between US and Canadian Anti-Spam Laws Canada's Anti-Spam Law (or "CASL") will be in effect in July 2014, about ten years after the U.S. has enacted its anti-spam

More information

Protecting your business from spam

Protecting your business from spam Protecting your business from spam What is spam? Spam is the common term for electronic junk mail unwanted messages sent to a person s email account or mobile phone. Spam messages vary: some simply promote

More information

CAN-SPAM Policy & Data Verification Guide

CAN-SPAM Policy & Data Verification Guide BIZ SERVICE PROVIDER CAN-SPAM Compliance & Data Verification Policy Document BSP CAN-SPAM Policy & Data Verification Guide BSP Page 1 of 5 Version 8.1 Effective Date; May 2015 BIZ SERVICE PROVIDER I. Summary

More information

How To Comply With The Can-Spam Act

How To Comply With The Can-Spam Act FTC FACTS for Business ftc.gov FEDERAL TRADE COMMISSION FOR THE CONSUMER 1-877-FTC-HELP The CAN-SPAM Act: A Compliance Guide for Business D o you use email in your business? The CAN-SPAM Act, a law that

More information

How to Stop Spam Emails and Bounces

How to Stop Spam Emails and Bounces Managing Your Email Reputation For most companies and organizations, email is the most important means of business communication. The value of email today, however, has been compromised by the rampant

More information

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010

Unica OnDemand. Unica and email deliverability. Getting to the inbox. Publication Date: January 19, 2010 Unica OnDemand Publication Date: January 19, 2010 N10014 Getting to the inbox N40002 Sending an email is something you do every day. Even when you send a single email, occasionally the message does not

More information

PARTNER EMAIL GUIDELINES

PARTNER EMAIL GUIDELINES PARTNER EMAIL GUIDELINES The guidelines listed below are required pursuant to the Agreement entered into between Criteo and the Partner. Any breach of these guidelines except the last section related to

More information

Email deliverability: The good, the bad and the ugly

Email deliverability: The good, the bad and the ugly Email deliverability: The good, the bad and the ugly An Experian Data Quality White Paper March 2015 CONTENTS Introduction...1 The good...2 Open rate...2 Click-through rate...3 Authentication...4 The bad...4

More information

Questions or a need for further clarification should be directed to your College or department email administrator.

Questions or a need for further clarification should be directed to your College or department email administrator. Spam Email Advisory Continuing increases in the volume and sophistication of spam email have, in some cases, impacted the performance of our email systems causing nondelivery or delayed delivery of email.

More information

e-shot Unique Deliverability

e-shot Unique Deliverability e-shot Unique Deliverability Email Deliverability What is Email Deliverability? Email deliverability s aim is to maximise the number of email messages that reach the intended recipients inboxes. It is

More information

Introduction > Become an Expert > Get Ready to Sell > Sales Opps > Follow Up > Consultation > Now What

Introduction > Become an Expert > Get Ready to Sell > Sales Opps > Follow Up > Consultation > Now What 12/16/13 Introduction Welcome to the Swiftpage Reseller Program! As a Swiftpage Reseller you have the ability to provide Swiftpage s valuable Email Marketing and Marketing Automation features to your clients,

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

EMAIL DELIVERABILITY ESSENTIALS: 6 MUSTKNOW TIPS

EMAIL DELIVERABILITY ESSENTIALS: 6 MUSTKNOW TIPS EMAIL DELIVERABILITY ESSENTIALS: 6 MUSTKNOW TIPS 6 MUST-KNOW EMAIL DELIVERABILITY TIPS Here, in plain language, are the most essential elements of an email marketing campaign that will get your message

More information

Best Practice Data Collection for Marketers

Best Practice Data Collection for Marketers Best Practice Data Collection for Marketers 15 ways to streamline your sign up process For more information please contact clients@adestra.com or call +44 (0)1865 24 24 25 1 Best Practice Data Collection

More information

BUILDING A PERMISSION- BASED EMAIL MARKETING LIST

BUILDING A PERMISSION- BASED EMAIL MARKETING LIST BUILDING A PERMISSION- BASED EMAIL MARKETING LIST Say Please Before Hitting Send InfoUSA wants email marketers to know that you have two choices: You can either send unsolicited email or send email to

More information

10 Tactics and Tips to Take Your Email Marketing Program to the Next Level

10 Tactics and Tips to Take Your Email Marketing Program to the Next Level 10 Tactics and Tips to Take Your Email Marketing Program to the Next Level Brought to you by em+c, a Target Marketing Group Publication www.emarketingandcommerce.com 10 Tactics and Tips to Take Your Email

More information

Emailserving Email Marketing Best Practices Quick Guide

Emailserving Email Marketing Best Practices Quick Guide Emailserving Email Marketing Best Practices Quick Guide Written By: Shane Lee Assistant Marketing Manager Page 2 Summary: Email marketing is one of the most effective forms of advertising. It is cost effective,

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Acceptable Use Policy (AUP) ionfish Group, LLC s network and services have been designed to serve its clients, partners, and employees (each individually a User ), and to enhance

More information

A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results

A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results A Whitepaper of Email Marketing Questions and Answers Email Marketing 101: Tips to Maximize Email Results Page 0 of 8 Introduction This document summarizes the questions that were asked during the session

More information

Spam: What Consumers Really Think

Spam: What Consumers Really Think From First Click to Lifetime Customer WHITE PAPER Spam: What Consumers Really Think Survey Finds Growing Anger; Advice for Avoiding Recipients Wrath SPAM: WHAT CONSUMERS REALLY THINK Survey finds growing

More information

How To Ensure Your Email Is Delivered

How To Ensure Your Email Is Delivered Everything You Need to Know About Delivering Email through Your Web Application SECTION 1 The Most Important Fact about Email: Delivery is Never Guaranteed Email is the backbone of the social web, making

More information

Best Practice Standards for Email Marketing

Best Practice Standards for Email Marketing Best Practice Standards for Email Marketing Updated January 2008 Scope The Marketing Association s emarketing Network (emn) champions the adoption of industrywide standards of best practice and ethical

More information

Mailworks Anti-Spam Policy

Mailworks Anti-Spam Policy Mailworks Anti-Spam Policy September 24, 2014 Guidelines Before adding new recipients to your contact list, you need to ensure that you have the proper permission for each and every recipient on your list.

More information

SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE

SIMPLE STEPS TO AVOID SPAM FILTERS EMAIL DELIVERABILITY SUCCESS GUIDE SIMPLE STEPS TO AVOID SPAM FILTERS SECTION 1 UNDERSTANDING THE BASICS Marketing emails account for most this is spam complaints, 70% in fact, which explains the scrutiny some marketers see applied to their

More information

ARE YOU DOING E-MAIL MARKETING? LEGALLY?

ARE YOU DOING E-MAIL MARKETING? LEGALLY? ARE YOU DOING E-MAIL MARKETING? LEGALLY? Copyright 2008, Michael D. Jenkins, J.D., CPA All Rights Reserved Since so many small businesses now do a substantial part of their marketing on the Internet, it

More information

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact

Top 25 Email Marketing Terms You Should Know. Email Marketing from Constant Contact Email Marketing from Constant Contact Top 25 Email Marketing Terms You Should Know Constant Contact, Inc. 1601 Trapelo Road, Suite 329 Waltham, MA 02451 www.constantcontact.com If you have ever felt out

More information

Website Privacy Policy Statement

Website Privacy Policy Statement Website Privacy Policy Statement This website ( CRSF Website ) is operated by Cal Ripken, Sr. Foundation, Inc. ( Company ) and this policy applies to all websites owned, operated, controlled and otherwise

More information

Spam DNA Filtering System

Spam DNA Filtering System The Excedent Spam DNA Filtering System provides webmail.us customers with premium and effective junk email protection. Threats to email services are rising rapidly. A Growing Problem As of November 2002,

More information

8/4/2015 Sphere 9.4.6 Sphere Email US

8/4/2015 Sphere 9.4.6 Sphere Email US Sphere Email Guide 8/4/2015 Sphere 9.4.6 Sphere Email US 2015 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means, electronic, or mechanical,

More information

Certification. Standards & Requirements

Certification. Standards & Requirements Certification Standards & Requirements Table of Contents What Are the Standards and Requirements for Becoming and Staying Certified?... 5 Why Do We Hold Senders to These Standards and Requirements?...

More information

Email Data Management Best Practices

Email Data Management Best Practices Email Data Management Best Practices September 17, 2008 These Best Practices have been developed by the IAB Email Committee. About the IAB Email Committee: The Email Committee is dedicated to removing

More information

Cloud Services. Email Anti-Spam. Admin Guide

Cloud Services. Email Anti-Spam. Admin Guide Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...

More information

Data is at the heart of deliverability

Data is at the heart of deliverability FOR ADESTRA CLIENTS ONLY! Page 1 of 5 Data is at the heart of deliverability Introduction Following an in-depth project by Adestra into deliverability in the UK a common theme has emerged. Your data management

More information

Three pillars of successful email deliverability

Three pillars of successful email deliverability Three pillars of successful email deliverability Ensuring safe arrival and optimum placement in the inbox An Experian Marketing Services white paper Contents Introduction...1 Data integrity...2 Relevance...3

More information

Fighting spam in Australia. A consumer guide

Fighting spam in Australia. A consumer guide Fighting spam in Australia A consumer guide Fighting spam Use filtering software Install anti-virus software Use a personal firewall Download security patches Choose long and random passwords Protect your

More information

Blackbaud Communication Services Overview of Email Delivery and FAQs

Blackbaud Communication Services Overview of Email Delivery and FAQs Blackbaud Communication Services Blackbaud Communication Services Overview of Email Delivery and FAQs Email Delivery through your Blackbaud Solutions Blackbaud Communication Services can send large numbers

More information

How To Prevent Spam From Being Filtered Out Of Your Email Program

How To Prevent Spam From Being Filtered Out Of Your Email Program Active Carrot - Avoiding Spam Filters Table of Contents What is Spam?... 3 How Spam Filters Work... 3 Avoid these common mistakes... 3 Preventing False Abuse Reports... 4 How Abuse Reports Work... 4 Reasons

More information

Frequently Asked Questions (FAQ) on Anti-Spam Legislation. What is the definition of a commercial electronic mail message?

Frequently Asked Questions (FAQ) on Anti-Spam Legislation. What is the definition of a commercial electronic mail message? Frequently Asked Questions (FAQ) on Anti-Spam Legislation On December 16, 2003, the President signed the CAN-SPAM Act of 2003 (S.877) into law, which went into effect January 1, 2004. Though the legislation

More information

ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON

ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON PRB 09-24E ANTI-SPAM LAWS IN WESTERN COUNTRIES: A COMPARISON Alysia Davies Legal and Legislative Affairs Division 18 January 2010 PARLIAMENTARY INFORMATION AND RESEARCH SERVICE SERVICE D INFORMATION ET

More information

EMAIL MARKETING $25. Your guide to navigating the evolving email landscape. THE LIST COMPANY THAT MAKES A DIFFERENCE

EMAIL MARKETING $25. Your guide to navigating the evolving email landscape. THE LIST COMPANY THAT MAKES A DIFFERENCE $25 Estimated Value 21st Century Marketing Presents AN INSIDER S GUIDE TO EMAIL MARKETING Your guide to navigating the evolving email landscape. THE LIST COMPANY THAT MAKES A DIFFERENCE CALL US TODAY AT

More information

Emails and anti-spam Page 1

Emails and anti-spam Page 1 Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails

More information

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com.

Website Privacy Policy Statement. 1519 York Rd Lutherville, MD 21093. We may be reached via email at julie@juliereisler.com. Website Privacy Policy Statement This website juliereisler.com is operated by Empowered Living, LLC and this policy applies to all websites owned, operated, controlled and otherwise made available by Company,

More information

RESEARCH BRIEF (The Impact of SPAM on Email) Date: 6/1/2005

RESEARCH BRIEF (The Impact of SPAM on Email) Date: 6/1/2005 RESEARCH BRIEF (The Impact of SPAM on Email) Date: 6/1/2005 Topic: The Impact of SPAM on Email We investigate the new CAN-SPAM law and find how one major retailer risked a minimum $41,500 fine just by

More information

MCH Channel_e Email Best Practices for Marketers

MCH Channel_e Email Best Practices for Marketers MCH Channel_e Email Best Practices for Marketers Best Practices for Marketers Communicating with your prospects and customers through email is a popular channel that provides almost immediate response.

More information

The Basics of Email Marketing

The Basics of Email Marketing The Basics of Email Marketing YOU RE SMART TO EXPLORE EMAIL MARKETING You realize the value in staying in touch with your customers through email, but you may not be sure where to start. Let s face it

More information

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application

WHITEPAPER. SendGrid Deliverability Guide V2. Everything You Need to Know About Delivering Email through Your Web Application WHITEPAPER SendGrid Deliverability Guide V2 Everything You Need to Know About Delivering Email through Your Web Application The Most Important Fact about Email: Delivery is Never Guaranteed Email is the

More information

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL

An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email

More information

Email Marketing Workshop

Email Marketing Workshop Email Marketing Workshop Part V Deliverability, Compliance & Trust Agenda Getting To The Inbox Protecting Your Brand Email Laws & Regulations 1 Laurence Rothman Nationwide Senior Consultant, Brand Reputation

More information

Can Spam Be Legislated?

Can Spam Be Legislated? Journal of Applied Business and Economics Can Spam Be Legislated? Karen L. Hamilton Columbus State University Robert A. Fleck, Jr. Columbus State University Spam, the unsolicited email that shows up in

More information

Trext Details: Texting Best Practices, Legality and Security 1 For questions contact Kira McCoy: (303)-947-6583 kira@trext.com

Trext Details: Texting Best Practices, Legality and Security 1 For questions contact Kira McCoy: (303)-947-6583 kira@trext.com Trext Details: Texting Best Practices, Legality and Security 1 For questions contact Kira McCoy: (303)-947-6583 kira@trext.com I. Texting Best Practices (Based on research from CTIA, Cellular Telecommunications

More information

FKCC AUP/LOCAL AUTHORITY

FKCC AUP/LOCAL AUTHORITY FKCC AUP/LOCAL AUTHORITY The information contained in this section has its basis in Public Law 93.380. It is further enhanced however, by Florida State Board of Education Administrative Rule 6A-14.51 and

More information

The What, Why, and How of Email Authentication

The What, Why, and How of Email Authentication The What, Why, and How of Email Authentication by Ellen Siegel: Director of Technology and Standards, Constant Contact There has been much discussion lately in the media, in blogs, and at trade conferences

More information

BULK MAIL CAMPAIGN RULES

BULK MAIL CAMPAIGN RULES BULK MAIL CAMPAIGN RULES No matter what you do, or how closely you follow the guidelines we provide, the issue of spam is an ever changing and always evolving problem it is estimated that more than 70%

More information

The Proactive Marketer. Ensuring the safe arrival and optimum placement of emails

The Proactive Marketer. Ensuring the safe arrival and optimum placement of emails The Proactive Marketer Ensuring the safe arrival and optimum placement of emails Contents Introduction 4 Data integrity 5 Relevance 6 Reputation 8 Building a firm foundation 10 In summary 11 About the

More information

Email Deliverability:

Email Deliverability: Email Deliverability: A guide to reaching your audience Email deliverability is a key factor in email campaign performance. Understanding how email deliverability is calculated and how it affects your

More information

Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher

Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher Professional Diploma in Digital Marketing Module 4: Email Marketing Version 5.0 Lecturer: David Maher David Maher Product & ecommerce Manager with Scope Ophthalmics 10+ Years experience in Digital Marketing

More information

A quick guide to... Permission: Single or Double Opt-in?

A quick guide to... Permission: Single or Double Opt-in? A quick guide to... Permission: Single or Double Opt-in? In this guide... Learn how to improve campaign results by sending new contacts a confirmation email to verify their intention to join. Table of

More information

Post-Send Vetting Techniques... 6 Methodology... 6

Post-Send Vetting Techniques... 6 Methodology... 6 Messaging Anti-Abuse Working Group (MAAWG) Vetting Best Common Practices (BCP) November 2011 Introduction... 1 Why Vet?... 2 Pre-Send Vetting Techniques... 2 Corporate Entity Formation and History... 2

More information

EMAIL MARKETING TIPS. From Our InfoUSA Email Experts

EMAIL MARKETING TIPS. From Our InfoUSA Email Experts EMAIL MARKETING TIPS From Our InfoUSA Email Experts In order to assist you every step of the way while creating an Email Marketing Campaign, our InfoUSA Email Experts have compiled lists of their best

More information

INinbox Start-up Pack

INinbox Start-up Pack 2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the

More information

INBOX. How to make sure more emails reach your subscribers

INBOX. How to make sure more emails reach your subscribers INBOX How to make sure more emails reach your subscribers White Paper 2011 Contents 1. Email and delivery challenge 2 2. Delivery or deliverability? 3 3. Getting email delivered 3 4. Getting into inboxes

More information

Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER

Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER Email Best Practices A WORD TO THE WISE WHITE PAPER BY LAURA ATKINS, CO- FOUNDER 2 Introduction Discussions of best practices for email marketing can be a confusing array of one- size- fits- all suggestions

More information

Opt-In versus Opt-Out Permission and Privacy. Picture the following scenario to see the industry s quandary on what options to CHAPTER 3

Opt-In versus Opt-Out Permission and Privacy. Picture the following scenario to see the industry s quandary on what options to CHAPTER 3 CHAPTER 3 Opt-In versus Opt-Out Permission and Privacy Picture the following scenario to see the industry s quandary on what options to offer customers. At your favorite online music store, you have chosen

More information

Acceptable Use Policy

Acceptable Use Policy Acceptable Use Policy Contents 1. Internet Abuse... 2 2. Bulk Commercial E-Mail... 2 3. Unsolicited E-Mail... 3 4. Vulnerability Testing... 3 5. Newsgroup, Chat Forums, Other Networks... 3 6. Offensive

More information

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY

Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY Cass Cable TV, Inc. and Greene County Partners, Inc. CASSCOMM ACCEPTABLE USE POLICY CONTENTS I. Introduction II. Violation of this Acceptable Use Policy III. Prohibited Uses and Activities IV. Customer

More information

Public Law 108 187 108th Congress An Act

Public Law 108 187 108th Congress An Act 117 STAT. 2699 Public Law 108 187 108th Congress An Act To regulate interstate commerce by imposing limitations and penalties on the transmission of unsolicited commercial electronic mail via the Internet.

More information

Email Deliverability. Best Practices for Getting to the Inbox

Email Deliverability. Best Practices for Getting to the Inbox Email Deliverability Best Practices for Getting to the Inbox About Real Magnet Real Magnet develops digital marketing technologies with a focus on Email and Marketing Automation. Its full-featured platform

More information

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy?

SPAM AND PRIVACY ISSUES. Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? SPAM AND PRIVACY ISSUES Spam for Breakfast, Lunch and Dinner: What will the Unsolicited Electronic Messages Bill do for Privacy? 30 March 2006 Graeme Crombie Senior Associate Minter Ellison Rudd Watts

More information

Email Reputation Metrics Troubleshooter. Share it!

Email Reputation Metrics Troubleshooter. Share it! Email Reputation Metrics Troubleshooter page: 1 Email Reputation Metrics Troubleshooter Written By Dale Langley Dale has been working with clients to improve their email deliverability and response rates,

More information

email deliverability

email deliverability There s no question that email software and the people who use it are getting better at filtering out spam. This is good since it makes it easier for engaging emails to get through but without a strong

More information

Creating Measurable Success Business-to-Business E-Marketing

Creating Measurable Success Business-to-Business E-Marketing Creating Measurable Success Business-to-Business E-Marketing When determining the most effective marketing mix, e-mail marketing as an inexpensive yet highly powerful vehicle is a critical part of a strategic

More information

You ve got. Best practices for email deliverability. Microsoft Dynamics Marketing

You ve got. Best practices for email deliverability. Microsoft Dynamics Marketing You ve got Best practices for email deliverability Microsoft Dynamics Marketing Table of Contents Summary & author introduction Getting into the inbox with grace If you don t know, now you know: terms

More information

Email Win-Back Programs: Everyone Recommends Them, But Do They Work?

Email Win-Back Programs: Everyone Recommends Them, But Do They Work? Email Win-Back Programs: 1 Everyone Recommends Them, But Do They Work? Email Win-Back Programs: Everyone Recommends Them, But Do They Work? We ve missed you! Yes, But Not the Way You Think Talk to a permission-based

More information

BEST PRACTICES IN EMAIL MARKETING. Get Delivered, Get Read, and Get Results

BEST PRACTICES IN EMAIL MARKETING. Get Delivered, Get Read, and Get Results BEST PRACTICES IN EMAIL MARKETING Get Delivered, Get Read, and Get Results 2009 RightNow Technologies. All rights reserved. RightNow and RightNow logo are trademarks of RightNow Technologies Inc. All other

More information

[First Reprint] SENATE COMMITTEE SUBSTITUTE FOR. SENATE, No. 1037 STATE OF NEW JERSEY. 211th LEGISLATURE ADOPTED MARCH 8, 2004

[First Reprint] SENATE COMMITTEE SUBSTITUTE FOR. SENATE, No. 1037 STATE OF NEW JERSEY. 211th LEGISLATURE ADOPTED MARCH 8, 2004 [First Reprint] SENATE COMMITTEE SUBSTITUTE FOR SENATE, No. 0 STATE OF NEW JERSEY th LEGISLATURE ADOPTED MARCH, 00 Sponsored by: Senator JOSEPH CONIGLIO District (Bergen) Assemblyman JEFF VAN DREW District

More information

The Power of Email Marketing

The Power of Email Marketing The Power of Email Marketing Connect. Inform. Grow. Copyright 2008 Constant Contact Inc. Introduction This presentation has three parts Connect, Inform, and Grow Connecting to build customer relationships

More information

5 tips to improve your email database. An Experian Data Quality white paper

5 tips to improve your email database. An Experian Data Quality white paper 5 tips to improve your email database An Experian Data Quality white paper While many marketers spend significant time and effort optimizing content and debating the timing of each campaign, marketers

More information